[-] sapporo@sopuli.xyz 1 points 3 weeks ago

but an attacker isn't obliged to take on all the open ports, he could work with some of them - the ones that may seem the most interesting to him

[-] sapporo@sopuli.xyz 1 points 3 weeks ago* (last edited 3 weeks ago)

Ok, back to this then:

If everything reports open then what ports do you focus on first?

I don't see an issue here. An attacker would be overwhemed with choise and excitement so that he wouldn't be able to decide which port to choose first, get stuck for a several months unable to decide? He'd toss a coin then.

[-] sapporo@sopuli.xyz 1 points 3 weeks ago

My ports are always open for you, my son. And doors, and windows.

[-] sapporo@sopuli.xyz 1 points 3 weeks ago* (last edited 3 weeks ago)

You can’t pretend-close it and still have that service work.

indeed, a service on a port would no longer properly work. However, pretending that an open port is closed is possible the same way when pretending that's open

[-] sapporo@sopuli.xyz 0 points 4 weeks ago

it has nothing to do with it. Welcome to the real English

17
submitted 4 weeks ago* (last edited 4 weeks ago) by sapporo@sopuli.xyz to c/programming@programming.dev

I've read an article which describes how to simulate the close ports as open in Linux by eBPF. That is, an outside port scanner, malicious actor, will get tricked to observe that some ports, or all of them, are open, whereas in reality they'll be closed.

How could this be useful for the owner of a server? Wouldn't it be better to pretend otherwise: open port -> closed?

[-] sapporo@sopuli.xyz 0 points 4 weeks ago* (last edited 4 weeks ago)

It's got CLI too - alright. But is it any de-facto, mature, well-known, widely used? What gurantees that it's as secure as openssl or gpg? It might have plenty of bugs and vulnerabilies.

[-] sapporo@sopuli.xyz 1 points 4 weeks ago* (last edited 4 weeks ago)
  1. backups, non-incremental ones
  2. prevent others from viewing information that may be sensitive
  3. encrypted files and directories will then be copied over to external drives and third-party servers
[-] sapporo@sopuli.xyz 2 points 1 month ago

I don't want to encypt them in-place because I'll be uploading them onto a server, copying them on an external drive.

26
submitted 1 month ago* (last edited 1 month ago) by sapporo@sopuli.xyz to c/programming@programming.dev

Namely, de-facto, or one of, in Linux. Mature. No GUI. Open-source and free.

What is it? GPG or anything else?

For a separate file(s), or directory(ies), and not for the entire disk or partition.

[-] sapporo@sopuli.xyz 2 points 1 month ago* (last edited 1 month ago)

that's why you should be logged out of Google and also delete your cookies periodically :) To reset the memory of Google

11
submitted 1 month ago* (last edited 1 month ago) by sapporo@sopuli.xyz to c/politics@beehaw.org

Our sanctions full of holes at play, guys. Even in LNG

[-] sapporo@sopuli.xyz 1 points 1 month ago

. Some of them could also be implemented with native messaging.

Some? Or all?

uBlockOrigin would still loose some of its features and capabilities nonetheless, even if a sub-set of them could be implemented in other ways. Not?

[-] sapporo@sopuli.xyz 1 points 1 month ago* (last edited 1 month ago)

Not in the direct war - correct. But in a proxy one. But even in it we haven't been to even match Russia's weapon production and which we have also admitted. By the margin of 3-7 times.

But that's about weapons. What about economy? Geopolitics? No major blow-ups for Russia, if not the opposite, either.

view more: next ›

sapporo

joined 2 months ago